ThreatGet – Cyber Security by design

Introduction

Holistic Cyer Security by Design: With ThreatGet, our security consulting partners identify and document the entire system development process for threats, automatically and up to date thanks to a scientific, continuously updated threat catalogue developed by the AIT Austrian Institute of Technology.

What is ThreatGet?

ThreatGet offers a holistic method and a partner programme for security consulting companies in a security-critical environment.

Threat analysis is an essential part of system development and is still based on subjective expert judgement. ThreatGet helps you to innovate this expensive and subjective process by automating the analysis and formalising the threat information.

The analysis results are reusable, and all remediation and design decisions are traceable throughout the development process. ThreatGet helps save costs and the refreshable threat catalogue automatically keeps the analysis up to date.

R

Automatic security evaluation

Based on AI, ThreatGet automatically identifies hazards and threats on an ongoing basis and supports ongoing risk management. The tool extends the proven Enterprise Architect modelling platform and is designed to support use cases in various sectors, such as automotive and industry. ThreatGet recognises and evaluates insecure system architecture.

R

Expandable model library

ThreatGet contains domain-specific security-relevant elements for system modelling. Company-specific model elements and threats can also be added. All model elements contain predefined security parameters to take existing security concepts into account.

R

Automatic updates of threat data

Stay up to date with ThreatGet and receive the latest cybersecurity threats with a subscription to the threat database

R

Standards and regulations

models in ThreatGet document and fulfil international standards, regulations and norms (e.g.. ISO 21434, IEC 62443, ..)

The 4 problem areas of cyber threats

R

Vulnerability of technology

Every software has bugs.

R

System complexity (IoT)

Due to their complexity, open interacting systems cannot be controlled manually. A car, for example, has 150 control elements.

R

Safety & Security IT / OT

Security often only takes place after the system development process and there is a lack of precise documentation. Outsiders often recognise vulnerabilities earlier.

R

Cyber Crime as a Service

There are 100,000 – 200,000 types of malware worldwide every day, and the attack tools are freely available.

Winner Constantinus Award 2021

For its innovative approach to cyber security and threat analysis, ThreatGet 2021 was awarded 1st place in the ‘Digitalisation and IoT’ category of the Constantinus Award.